Loading…
Secure Transmission Scheme Based on Dual-Thresholds for Simultaneous Wireless Information and Power Transfer
This paper studies a simultaneouswireless information and power transfer sys-tem with multiple external eavesdroppers andinternal curious users. We model the randomnetwork by Poisson cluster process in con-sideration of the case where eavesdroppershide around certain targets. Focusing on theusers th...
Saved in:
Published in: | China communications 2017-12, Vol.14 (12), p.25-44 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This paper studies a simultaneouswireless information and power transfer sys-tem with multiple external eavesdroppers andinternal curious users. We model the randomnetwork by Poisson cluster process in con-sideration of the case where eavesdroppershide around certain targets. Focusing on theusers that work in harvesting-transmittingmode with time switching receivers, we estab-lish communication model via time divisionmultiple access. On this basis, we propose alightweight secure transmission scheme basedon dual-thresholds for physical-layer securityenhancement, which consists of two protocolsapplied to the downlink (DL) and uplink (UL)transmission respectively. In the DL, we de-sign a dynamic information-power switchingtransmission protocol based on signal-to-noiseratio threshold, which provides an opportunis-tic approach to reform the fixed period alloca-tion of information and power transfer; in theUL, an energy threshold is proposed for usersto control the transmission, which is called auser-led on-off transmission protocol. Further-more, we give a comprehensive performanceanalysis for the proposed scheme in terms ofdelay, reliability, security and secrecy through-put. Based on the analysis results, we optimizethe two thresholds and the DL-UL allocationcoefficient to maximize the secrecy through-put. Simulation results show the proposedscheme can bring about a substantial secrecygain. |
---|---|
ISSN: | 1673-5447 |
DOI: | 10.1109/CC.2017.8246335 |